×

zbMATH — the first resource for mathematics

Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. (English) Zbl 1392.94009
Lecture Notes in Computer Science 10946. Cham: Springer (ISBN 978-3-319-93637-6/pbk; 978-3-319-93638-3/ebook). xv, 833 p. (2018).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. For the preceding conference see [Zbl 1365.94006; Zbl 1365.94005].
Indexed articles:
Peng, Liqiang; Lu, Yao; Kunihiro, Noboru; Zhang, Rui; Hu, Lei, A deterministic algorithm for computing divisors in an interval, 3-12 [Zbl 1421.11105]
Wen, Yunhua; Liu, Shengli, Reusable fuzzy extractor from LWE, 13-27 [Zbl 1444.94107]
Cheon, Jung Hee; Jeong, Jinhyuck; Kim, Dongwoo; Lee, Jongchan, A reusable fuzzy extractor with practical storage size: modifying Canetti et al.’s construction, 28-44 [Zbl 1444.94053]
David, Bernardo; Dowsley, Rafael; Larangeira, Mario, 21 – bringing down the complexity: fast composable protocols for card games without secret state, 45-63 [Zbl 1444.94060]
Kikuchi, Ryo; Ikarashi, Dai; Matsuda, Takahiro; Hamada, Koki; Chida, Koji, Efficient bit-decomposition and modulus-conversion protocols with an honest majority, 64-82 [Zbl 1444.94076]
Xia, Zhe; Sun, Liuying; Yang, Bo; Zhou, Yanwei; Zhang, Mingwu, Verifiable secret sharing based on hyperplane geometry with its applications to optimal resilient proactive cryptosystems, 83-100 [Zbl 1444.94122]
Kim, Eunkyung; Lee, Hyang-Sook; Park, Jeongeun, Towards round-optimal secure multiparty computations: multikey FHE without a CRS, 101-113 [Zbl 1444.94078]
Paul, Souradyuti; Shrivastava, Ananya, Robust multiparty computation with faster verification time, 114-131 [Zbl 1444.94095]
Heys, Howard M., Distributed time-memory tradeoff attacks on ciphers (with application to stream ciphers and counter mode), 135-153 [Zbl 1444.94070]
Ito, Ryoma; Miyaji, Atsuko, New iterated RC4 key correlations, 154-171 [Zbl 1444.94072]
Ye, Chendong; Tian, Tian, A new framework for finding nonlinear superpolies in cube attacks against Trivium-like ciphers, 172-187 [Zbl 1444.94110]
Marrière, Nicolas; Nachef, Valérie; Volte, Emmanuel, Differential attacks on reduced round LILLIPUT, 188-206 [Zbl 1444.94089]
Sarkar, Sumanta; Syed, Habeeb, Bounds on differential and linear branch number of permutations, 207-224 [Zbl 1444.94098]
Naito, Yusuke, Keyed sponge with prefix-free padding: independence between capacity and online queries without the suffix key, 225-242 [Zbl 1444.94093]
Boyen, Xavier; Haines, Thomas, Forward-secure linkable ring signatures, 245-264 [Zbl 1444.94048]
Hu, Ziyuan; Liu, Shengli; Chen, Kefei; Liu, Joseph K., Revocable identity-based encryption from the computational Diffie-Hellman problem, 265-283 [Zbl 1444.94071]
Li, Shimin; Liang, Bei; Xue, Rui, Private functional signatures: definition and construction, 284-303 [Zbl 1444.94086]
Zheng, Haibin; Wu, Qianhong; Qin, Bo; Zhong, Lin; He, Shuangyu; Liu, Jianwei, Linkable group signature for auditing anonymous communication, 304-321 [Zbl 1444.94116]
Zhong, Lin; Wu, Qianhong; Qin, Bo; Zheng, Haibin; Liu, Jianwei, Auditable hierarchy-private public-key encryption, 322-340 [Zbl 1444.94117]
Anada, Hiroaki; Kanaoka, Akira; Matsuzaki, Natsume; Watanabe, Yohei, Key-updatable public-key encryption with keyword search: models and generic constructions, 341-359 [Zbl 1444.94040]
Ma, Xuecheng; Wang, Xin; Lin, Dongdai, Anonymous identity-based encryption with identity recovery, 360-375 [Zbl 1444.94090]
Liu, Chi; Chen, Rongmao; Wang, Yi; Wang, Yongjun, Asymmetric subversion attacks on signature schemes, 376-395 [Zbl 1444.94087]
Xu, Yan; Ding, Ran; Cui, Jie; Zhong, Hong, Intrusion-resilient public auditing protocol for data storage in cloud computing, 399-416 [Zbl 06944256]
Shen, Jian; Liu, Dengzhi; Chen, Xiaofeng; Huang, Xinyi; Chen, Jiageng; Zhang, Mingwu, Secure publicly verifiable computation with polynomial commitment in cloud computing, 417-430 [Zbl 06944257]
Liu, Lin; Su, Jinshu; Chen, Rongmao; Liu, Ximeng; Wang, Xiaofeng; Chen, Shuhui; Leung, Hofung, Privacy-preserving mining of association rule on outsourced cloud data from multiple parties, 431-451 [Zbl 06944258]
Li, Haoyu; Liu, Renzhang; Nitaj, Abderrahmane; Pan, Yanbin, Cryptanalysis of the randomized version of a lattice-based signature scheme from PKC’08, 455-466 [Zbl 1444.94085]
Ding, Jintai; Fluhrer, Scott; Rv, Saraswathy, Complete attack on RLWE key exchange with reused keys, without signal leakage, 467-486 [Zbl 1444.94063]
Wang, Yacheng; Ikematsu, Yasuhiko; Duong, Dung Hoang; Takagi, Tsuyoshi, Efficient decryption algorithms for extension field cancellation type encryption schemes, 487-501 [Zbl 1444.94105]
Yu, Zuoxia; Au, Man Ho; Yang, Rupeng; Lai, Junzuo; Xu, Qiuliang, Lattice-based universal accumulator with nonmembership arguments, 502-519 [Zbl 1444.94111]
Zhang, Daode; Zhang, Kai; Li, Bao; Lu, Xianhui; Xue, Haiyang; Li, Jie, Lattice-based dual receiver encryption and more, 520-538 [Zbl 1444.94114]
Lai, Qiqi; Yang, Bo; Yu, Yong; Chen, Yuan; Dong, Liju, Anonymous identity-based hash proof system from lattices in the standard model, 539-557 [Zbl 1444.94081]
Alberto Torres, Wilson Abel; Steinfeld, Ron; Sakzad, Amin; Liu, Joseph K.; Kuchta, Veronika; Bhattacharjee, Nandita; Au, Man Ho; Cheng, Jacob, Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0), 558-576 [Zbl 1444.94038]
Kılınç, Handan; Vaudenay, Serge, Secure contactless payment, 579-597 [Zbl 1444.94077]
Ahmadi, Ahmad; Safavi-Naini, Reihaneh; Akand, Mamunur, New attacks and secure design for anonymous distance-bounding, 598-616 [Zbl 1444.94037]
Zou, Deqing; Deng, Zhijun; Li, Zhen; Jin, Hai, Automatically identifying security bug reports via multitype features analysis, 619-633 [Zbl 06944268]
Zeng, Yali; Li, Xu; Yang, Xu; Xu, Qikui; Wang, Dongcheng, A practical privacy preserving protocol in database-driven cognitive radio networks, 634-648 [Zbl 1444.94112]
Cui, Jie; He, Jiantao; Xu, Yan; Zhong, Hong, TDDAD: time-based detection and defense scheme against ddos attack on SDN controller, 649-665 [Zbl 06944270]
Hu, Kexin; Zhang, Zhenfeng, Fast lottery-based micropayments for decentralized currencies, 669-686 [Zbl 06944271]
Yin, Jiayuan; Wang, Changren; Zhang, Zongyang; Liu, Jianwei, Revisiting the incentive mechanism of bitcoin-NG, 706-719 [Zbl 06944273]
Yang, Rupeng; Au, Man Ho; Xu, Qiuliang; Yu, Zuoxia, Decentralized blacklistable anonymous credentials with reputation, 720-738 [Zbl 06944274]
Sun, Yinxia; Zhang, Futai; Fu, Anmin, Revocable certificateless encryption with ciphertext evolution, 741-749 [Zbl 1444.94101]
Lau, Terry Shue Chien; Tan, Chik How, A new encryption scheme based on rank metric codes, 750-758 [Zbl 1444.94082]
Meng, Weizhi; Wang, Yu; Li, Wenjuan; Liu, Zhe; Li, Jin; Probst, Christian W., Enhancing intelligent alarm reduction for distributed intrusion detection systems via edge computing, 759-767 [Zbl 06944277]
Barbar, Mohamad; Sui, Yulei; Zhang, Hongyu; Chen, Shiping; Xue, Jingling, Live path CFI against control flow hijacking attacks, 768-779 [Zbl 06944278]
Lee, Hyung Tae; Wang, Huaxiong; Zhang, Kai, Security analysis and modification of ID-based encryption with equality test from ACISP 2017, 780-786 [Zbl 1444.94083]
Wang, Yuntao; Takagi, Tsuyoshi, Improving the BKZ reduction algorithm by quick reordering technique, 787-795 [Zbl 1444.94106]
Sun, Yeali S.; Chen, Chien-Chun; Hsiao, Shun-Wen; Chen, Meng Chang, Antsdroid: automatic malware family behaviour generation and analysis for Android apps, 796-804 [Zbl 06944281]
Lai, Junzuo; Huang, Zhengan; Au, Man Ho; Mao, Xianping, Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation, 805-812 [Zbl 1444.94080]
Lu, Xingye; Zhang, Zhenfei; Au, Man Ho, Practical signatures from the Partial Fourier Recovery problem revisited: a provably-secure and Gaussian-distributed construction, 813-820 [Zbl 1444.94088]
Sarkar, Pinaki; Baranwal, Mayank; Nandi, Sukumar, CRT-KPS: Ukey predistribution schemes using CRT, 821-830 [Zbl 1444.94097]

MSC:
94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
94A60 Cryptography
94A62 Authentication, digital signatures and secret sharing
00B25 Proceedings of conferences of miscellaneous specific interest
PDF BibTeX XML Cite
Full Text: DOI